期刊文献+

3G视频会议系统中的ECC快速算法研究 被引量:4

Study on ECC High-speed Algorithm in 3G Video Conference System
原文传递
导出
摘要 3G视频会议系统由于受到无线网络开放性的限制,难以满足行业客户的特殊安全需求。现有3G视频会议系统的加密存在着诸多技术困难,其一就是常规加密算法对硬件要求高,时延较大。ECC加密算法可以较好地适应3G视频终端设备的要求,是一种可行的加密算法。针对此应用对ECC算法做进一步的优化能更好地适应3G视频会议系统终端的需求。文章提出了一种基于ECC的快速算法,经证明可以有效降低资源需求,提高速度,达到应用要求。 3G video conferencing system, due to its restrictions by open wireless networks, is difficult to meet the specific security requirement of the industry customers. The existing 3G video conferencing systems have many technical difficulties in encryption, one of which is high hardware requirement by conventional encryption algorithm, and large latency. ECC encryption algorithm wit a better adaptability to the requirements of 3G video terminal equipment is an applicable encryption algorithm. Based on this application, the ECC algorithm is further optimized, and thus could better adapt to the requirement of 3G video conferencing terminal. This paper proposes a fast algorithm based on ECC, which is proven to he effective in reducing resource requirement, raising operation speed, and thus up to the application requirement.
出处 《信息安全与通信保密》 2011年第12期95-96,共2页 Information Security and Communications Privacy
关键词 视频会议 椭圆曲线快速算法 第三代移动通信 video conference ECC high-speed algorithm 3G
  • 相关文献

参考文献5

  • 1YUJIRO Mochizuki. Securing Against Fraud in Mobile Communications: System Design and Development in 3G Mobile Networks[D]. Massachusetts, US: MIT, 2006.
  • 23rd Generation Partnership Project Technical Specification Group Core Network. 3Gpp TS 09.02 V7.9.0 Mobile Application Part(Map)specifieation[EB/OL]. (2001-03-12)[2011-09-20]. http: //www.3gpp.org.
  • 3WILLIAM Stallings. Cryptography and Network Security: Principles and Practice[M]. 4^th Edition.北京:电子工业出版社,2010.
  • 4张艳丽,刘嘉勇.基于ECC数字签名系统的设计与实现[J].信息安全与通信保密,2011,9(5):86-87. 被引量:5
  • 5赵琦,王威,柳增寿.基于ECC算法的Intranet身份认证系统设计[J].信息安全与通信保密,2007,29(8):211-213. 被引量:1

二级参考文献5

  • 1[4]冯登国.密码学原理与实践[M].北京:电子工业出版社,2003.
  • 2[1]IEEE P1363.Standard for Public_Key Cryptography:Working Draft[EB/OL].http://www.secg.org/,1998-08.
  • 3[2]Schoof R.Elliptic curves over finite fields and the computation of square roots mod p[J].Mathematics of Computation.1985,44(170):483~494
  • 4[3]Darrel Hankerson.椭圆曲线密码学导论[M].电子工业出版社.2005
  • 5孙琦,张起帆,彭国华.Dickson多项式g_e(x,1)公钥密码体制的新算法[J].四川大学学报(自然科学版),2002,39(1):18-23. 被引量:22

共引文献4

同被引文献14

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部